Trust and Reputation Issues

The basic p2p file-sharing implementations are usually open and blindly trusting. Any protocol-compliant computer that wishes to connect is accepted, assuming the accepting host’s connectivity settings allow new incoming connections. This behavior is after all the original open paradigm of mutual trust that used to rule in networks.

Complete openness however also means that the network is open to disruptive intrusions by rogue software. Although the current implementations are fairly resilient and generally immune to message spoofing, computer and bandwidth resources are finite and can eventually be overwhelmed. Intruders can exploit various vulnerabilities to disrupt at least the immediate subweb for a time. Ping ...

Get Peer to Peer: Collaboration and Sharing over the Internet now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.